بدائل البحث:
mapping algorithm » making algorithm (توسيع البحث), mining algorithm (توسيع البحث), learning algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
element mapping » elemental mapping (توسيع البحث), element modeling (توسيع البحث), argument mapping (توسيع البحث)
complement each » complement 5a (توسيع البحث), complement c3 (توسيع البحث), complement c5 (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), means algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
mapping algorithm » making algorithm (توسيع البحث), mining algorithm (توسيع البحث), learning algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
element mapping » elemental mapping (توسيع البحث), element modeling (توسيع البحث), argument mapping (توسيع البحث)
complement each » complement 5a (توسيع البحث), complement c3 (توسيع البحث), complement c5 (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), means algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
141
<b>SAFE: </b><b>s</b><b>ensitive </b><b>a</b><b>nnotation </b><b>f</b><b>inding and </b><b>e</b><b>xtraction from multi-type Chinese maps via hybrid intelligence and knowledge grap...
منشور في 2025"…<p dir="ltr">Sensitive annotations typically contain key geographic elements or sensitive information vital for geographic information security. …"
-
142
-
143
-
144
A bi-agent single-processor scheduling to minimize the sum of maximum lateness with release dates
منشور في 2025"…It is complemented by a heuristic algorithm based on Earliest Due Date List-Revising, providing an initial upper bound. …"
-
145
-
146
-
147
Description of data sources.
منشور في 2025"…<div><p>Objective</p><p>This paper introduces a novel framework for evaluating phenotype algorithms (PAs) using the open-source tool, Cohort Diagnostics.…"
-
148
-
149
-
150
High-Throughput Mass Spectral Library Searching of Small Molecules in R with NIST MSPepSearch
منشور في 2025"…Despite the availability of numerous library search algorithms, those developed by NIST and implemented in MS Search remain predominant, partly because commercial databases (e.g., NIST, Wiley) are distributed in proprietary formats inaccessible to custom code. …"
-
151
SpeLL: An Agent for Natural Language-Driven Intelligent Spectral Modeling
منشور في 2025"…The core strength of SpeLL lies in its dual RAG pathways. The Code RAG provides specialized code knowledge for spectral data analysis, enabling the LLM to generate robust and domain-specific analytical scripts that address the implementation and optimization of algorithms. …"
-
152
-
153
-
154
Butterfly unit for CT/GS/MM operation.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
155
NTT operations in MDC2NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
156
TW management in MDC4NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
157
NTT/INTT/PWM operations in MDC4NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
158
Coefficient access scheme in MDC4NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
159
Read Write operations in memory-based FIFOs.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
160
PWM calculations broken into simpler operations.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"